From patchwork Thu Feb 20 02:27:18 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: "Wang, Jinfeng (CN)" X-Patchwork-Id: 57634 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3ED4CC021AA for ; Thu, 20 Feb 2025 02:27:49 +0000 (UTC) Received: from mx0a-0064b401.pphosted.com (mx0a-0064b401.pphosted.com [205.220.166.238]) by mx.groups.io with SMTP id smtpd.web10.40762.1740018461776547660 for ; Wed, 19 Feb 2025 18:27:41 -0800 Authentication-Results: mx.groups.io; dkim=none (message not signed); spf=permerror, err=parse error for token &{10 18 %{ir}.%{v}.%{d}.spf.has.pphosted.com}: invalid domain name (domain: windriver.com, ip: 205.220.166.238, mailfrom: prvs=41461f232d=jinfeng.wang.cn@windriver.com) Received: from pps.filterd (m0250810.ppops.net [127.0.0.1]) by mx0a-0064b401.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 51K1iIca018914 for ; Wed, 19 Feb 2025 18:27:41 -0800 Received: from nam10-dm6-obe.outbound.protection.outlook.com (mail-dm6nam10lp2043.outbound.protection.outlook.com [104.47.58.43]) by mx0a-0064b401.pphosted.com (PPS) with ESMTPS id 44w00k9u97-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT) for ; Wed, 19 Feb 2025 18:27:40 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=DdrwMaWNzdFkqYYqR22ad6+GCjHSA4yZ32D1JnG8TGim5hd+BjHOJJGzoLBzLQ1WgB0IZkssunZ/Zj3pqPfKalLvWQ2kfX6fwdmyai/IsPCRdOEM+uTG9LYNsx1Dac9AoGy99XPLymfgOQkuo4fP/kN5FJARearfLtIdXJxeK5XRbVxx3NaE1Xjics25tyKChXNGkz3qEAohN0MHwtERzay4ozVXRQSsT5nCPuecjDD0HjTwbZpEuIu0iOa+RBjeHYpq+OfQLEha8oQhx//nYjtwKLtNq6XBtYSE+CxDnUI7aE9sBMloIkBn5fSD/Kxj+lekgiBl6KgDrxo/9+aYEA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Sq+Y4Ve7fG/79knfAqbomW5q5z6z4VzvzdW3X2RARaA=; b=v9L5k5CXDOQoy0rbuM2+ePbew/lKfLd/5L1JWXCPDKjfG1XMZ5uSszdMMl0c/gjEifhyBBX5Mv3Ypu8DgekvQM3kfyi9ta2RfFYdSvxYoAj6JLgCo1c3VU3ILN73ReqBqpN56x55/HPXSvydkL9TOqszMKi+NtpolT1VIQdgpJivlG3tFuzhBpp/x2q3m74UZHuZTdlaUx2p68ibFsnP8iTIypc+tRR3draMQ6nSsIAPOhg/q4l1BmabC9hyRrGjCmBlrNmY+IfsN8q0Vca4Lj6DCDXbq3psVvNMcz6z1mGeLFaY/fu1/Glei3QSqKi+6rannmaLJib367ZPBr6FPg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=windriver.com; dmarc=pass action=none header.from=windriver.com; dkim=pass header.d=windriver.com; arc=none Received: from DM4PR11MB5533.namprd11.prod.outlook.com (2603:10b6:5:38a::7) by DS7PR11MB8856.namprd11.prod.outlook.com (2603:10b6:8:253::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8466.14; Thu, 20 Feb 2025 02:27:35 +0000 Received: from DM4PR11MB5533.namprd11.prod.outlook.com ([fe80::8ce3:74f6:33ca:3dfd]) by DM4PR11MB5533.namprd11.prod.outlook.com ([fe80::8ce3:74f6:33ca:3dfd%6]) with mapi id 15.20.8445.020; Thu, 20 Feb 2025 02:27:34 +0000 From: jinfeng.wang.cn@windriver.com To: openembedded-devel@lists.openembedded.org Subject: [kirkstone][meta-networking][PATCH] net-snmp: fix memory leak Date: Thu, 20 Feb 2025 10:27:18 +0800 Message-Id: <20250220022718.1648508-1-jinfeng.wang.cn@windriver.com> X-Mailer: git-send-email 2.34.1 X-ClientProxiedBy: TYCPR01CA0148.jpnprd01.prod.outlook.com (2603:1096:400:2b7::7) To DM4PR11MB5533.namprd11.prod.outlook.com (2603:10b6:5:38a::7) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: DM4PR11MB5533:EE_|DS7PR11MB8856:EE_ X-MS-Office365-Filtering-Correlation-Id: 1fff3dea-ceb3-4354-048a-08dd5156229a X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|366016|52116014|1800799024|376014|13003099007|38350700014; X-Microsoft-Antispam-Message-Info: =?utf-8?q?d6DqX7iNk6GxYm43Q5nIDeRa2P3YiiS?= =?utf-8?q?tkLrUGwqdNbCKIirxl2agdewwekpLpCT4xmL1OmBMvjNEqwDi1iyqQvvymKctAKAa?= =?utf-8?q?CemOKuYllGEkkgEiXG7cQ6/Yg55HJsnZ41RJ2xJrUXZE662VHjO3Rqg5EfUCG/jQT?= =?utf-8?q?VPeNxARFlIjr6eYH8XQJzr6swXYSeufXORwiWWryqHUqR/R8IE0vi6F5mw2Fq1svv?= =?utf-8?q?2QVMgEHV88gJ7H9Wl6OlYNKGOhGSjgjiU+G9cSZye1C6gKljuQ/D83J9N+MoZhVY/?= =?utf-8?q?CTc5NwHZM3+xsdfUpGdicUvtmHuMh7BEamhVOnIYRTcfA0tIocXTlKb5OcHcSHCF0?= =?utf-8?q?yFTKxyxX0niHbV57oVeIVFj/1cWNF5ZciPGxvyeX8ILBKAeHgXcnyHZcxHA3y/lSg?= =?utf-8?q?rfR+T5BQsnyr6FaoVxseZm6B5O6EZ/bG5XsMdBffcllRe5YXRT6bDk97lb2UKejqS?= =?utf-8?q?557YIx3BkwcavbFtN5cYxztM9KNiJi79x4/PxzRY6xHU1P1BaGzhH/urHDlmFGrQK?= =?utf-8?q?XYclSC7E257W2ysHPSYbYeSKla7EvFVFEuXhqR7X0wm3AWftzunT5s9G4yA9NR4gC?= =?utf-8?q?jkiHEpi04XmTu1XostmWReWHhr5BGYzLVZ49p+i9VA2u4LaLzC0JduYHVxHF3bWqu?= =?utf-8?q?8AydP8B+5Axd9ZOfK2E7o/P/fPs4YMD4IAGfWfqy8FHmo4O0bXPvsS/kE8km5WPIJ?= =?utf-8?q?Xmc7g+2s0NsxBognVXtNmQo4/Ztjk5Yi1wvEoBmNfk0rhS8ZmfoBaNP/2Hp0Kqcqv?= =?utf-8?q?EOYFX7IeGUQbt0EGrRWAAIYzw08GMf3HTNdIkX2gz42ZHvCftFw2nSMfxWFolwUbG?= =?utf-8?q?k7Sg3duiO0OV/VaGPaushmZ+ah2QzqthGOzumUt0rK2lCF43LSlRC3si6ihP/s0JF?= =?utf-8?q?5gnnYGNzc2Ed7frYQTAjDcMt2AOkr3/OL4eq+4j9ke4LmpKrEDuIfKabcoAINQBzp?= =?utf-8?q?07eXPXBpbwsXLMEII2E2x2zQQi3vSLSpq4deQykrOX0gYjjUHuPzcYe3+veyWdSFs?= =?utf-8?q?sDSFRdjttveAbUcI7CwzzK67ONEfWI78T3bAIKbULw6ozsJRxbOgeoTFWQblCFoSm?= =?utf-8?q?iSNUQYlLlFL7fsgl2rgybSKyI9WNCY23hgCCM3PdNspdV8kt6k1+QDqjQjvKJ9Quk?= =?utf-8?q?FmVonve9fJ0x3qyMeUwFNQkOb/7kZyyVO642IM7ZyjKiG/veY0F5+AZpUZq9xijwl?= =?utf-8?q?uqhOr+bm9teG0Wx8s0OrLyeYTqf/qdFPz9iLRtQ78oGGZdpdPkeWZTn3/PneESekz?= =?utf-8?q?PIOjNJVf6Jg1Y33PTpCW4AnYYS9KVW2MZTV3W0eJzY5l6uPQNg9TuIgeXYU79Ekyq?= =?utf-8?q?bABKliVIgFHDr5rWpSySOb4iWFqWDpo3v8FJIF8rJF6+M80deNyD9AKHmdJ7SO9p7?= =?utf-8?q?jEli6cCu85w?= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DM4PR11MB5533.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(366016)(52116014)(1800799024)(376014)(13003099007)(38350700014);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?q?5AzNfftYnnHfHWh2vJIqeIEkyR7z?= =?utf-8?q?AO6sByHjCzPOVTLP0Xdx8quUfD0nH9Tn92dZnmxSL0ySS4ARFXia0AoVypYKpjJtH?= =?utf-8?q?texHm5TbmTO/O7vmP6kwZP8QZEY8qGaBkpkDGIUuPXOKWUssAWq/H3BLOcB38tcMk?= =?utf-8?q?DBhpmgj/BBbY2T/gW8F6LlhRH3/VTwtGhhVTaz4Y2+PGJW+XPIwz1Ccl0guK/1KA6?= =?utf-8?q?tlH4S4C2jWdEK/REGGd444U8lQgyaZQuMawT8L/lIh8vjhi6p1sjE1VuVyB90IKyB?= =?utf-8?q?lnf1ipR0cmnr/8pwXNjWiMJr8cQmuw3Zn2L9Jiapq3TkYduH/x1O2hoVnnhM1B2iz?= =?utf-8?q?ZjaS1YeKcNaHCvhk90kyEpdO7x3m7OJaMIcf1bh37wyCSs/clOz/T6J/GlmimJZBb?= =?utf-8?q?dTFaPl4bozfQKWe7ymAoBDJhAmQjCJVtXlM9+4puGwUU7o16foTu8aXVnV9NSBloY?= =?utf-8?q?r8rdAgvAZmiMYfQuWEVrQqp5jPiCJQbrv4n2E+M/Hmb+soqrAbpiWa5aDU/NQRRCE?= =?utf-8?q?EIecCbunUN7hbnu0bSZuNUbMeAHT+k/xW+W8QxdUc7Ohr9SlAs6MolT3ROExpCMvP?= =?utf-8?q?Z2sAnyZZXv5R1hkJNJ8pdUVES3f1hshxffFSnMP6Hlm4PiOaMm1iMPohyNz9PZdiV?= =?utf-8?q?804UNHYLpBUSULlSqdQCTsU65pM9+lc++mKgaZLq1DF7/2PGFqNEozcoLmwKWXP/O?= =?utf-8?q?72PNv+F1/+7TiCXPDwMWM6WPL5gz9LzS9c54PfmCKR0hlLdimLKir31KrEDPHvUDH?= =?utf-8?q?HUl4Qsf8gRu90CBcgyaAMrLvwPLHtFItmulz7MJxhuzk5auoWqd+rmY+aaBgxXRxp?= =?utf-8?q?q+qEGpkg27X2PCKFONvqED6dIaZrrTqDVTVJ+uMrnapZ6DTVYCgk8YKrA6T0gqU7s?= =?utf-8?q?evYxtOKIhz2aNUv9la2VZ/0oQsFyjtZHKH0+gLgKD5G9ULh08oDvekwImXqIk5npU?= =?utf-8?q?ti2W0n6VnRJ/lzc1PCt25AjLHpxGN7QT76+csiKeEgjMtWJPnV1DGmX3bY4mURsLC?= =?utf-8?q?O3p4F2WK9fRyOYY7EkZ6okS7u+EHX0xCjDcYYUTIshdVt3HRKmNwHG4wahoanCQLp?= =?utf-8?q?NSO8D6ZUq1vRjtwR2YFr3CFu9AvkN272rTvvSHW0pVrue7e8bHS0K4kfIPwPg0Dfx?= =?utf-8?q?rwgW5PSuQu+2S6udom+fEw4fdRbZKX/dupc8bkYNbWY+kjapaRcmjc5NrAXJVTCNn?= =?utf-8?q?Q6MgT+m5cwk/7PS7DpA+Pahdf5Pufvo4CvebMsjRocA4By4VZvli4yfnuX1NA5/3F?= =?utf-8?q?b5sTE7XzlTYkN5yvBxvWquK1naT0CQwaWJTFMOuXBx19AMu9ibXw2QeztNsuT2cfX?= =?utf-8?q?4PmWXkobB/XIYA0QhtP9iPK6MOdW5aarK1jNYcXfZAnH+PaH0u81tP6fuTR+HNKxK?= =?utf-8?q?ojI4C9AuswDTdPY58Y/ZSR1VJwkvhScOeJI40ftE+aYNskTt5q4ZcvoYeBhx607Ap?= =?utf-8?q?NIFJMsVQuVqr3GKD/AZLad8xClz2im4iG1EPtUaUumvEY8O+CbUDA1I1zk7rz96wW?= =?utf-8?q?L2YhGFm6N01MLLHnm7WtyiWfUN5skBO+3A=3D=3D?= X-OriginatorOrg: windriver.com X-MS-Exchange-CrossTenant-Network-Message-Id: 1fff3dea-ceb3-4354-048a-08dd5156229a X-MS-Exchange-CrossTenant-AuthSource: DM4PR11MB5533.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 20 Feb 2025 02:27:34.7954 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 8ddb2873-a1ad-4a18-ae4e-4644631433be X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: clhDizt0vl5Xqb1p5mPEShngxgbENJe83TvRhI+IYxftcfbWl1MJ6ludliwCw0lfrnGb3sWaBY89BdNz4HUWZIL+E3D+rW34wX3ANrSkTm4= X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS7PR11MB8856 X-Authority-Analysis: v=2.4 cv=N67TF39B c=1 sm=1 tr=0 ts=67b6931d cx=c_pps a=S2IcI55zTQM2EKrhu3zyRw==:117 a=wKuvFiaSGQ0qltdbU6+NXLB8nM8=:19 a=Ol13hO9ccFRV9qXi2t6ftBPywas=:19 a=xqWC_Br6kY4A:10 a=IkcTkHD0fZMA:10 a=T2h4t0Lz3GQA:10 a=NEAV23lmAAAA:8 a=t7CeM3EgAAAA:8 a=ThMX_IV2AAAA:8 a=v1Kj5RQZ9JAl_cKxDAUA:9 a=3ZKOabzyN94A:10 a=QEXdDO2ut3YA:10 a=RVmHIydaz68A:10 a=FdTzh2GWekK77mhwV6Dw:22 a=0jcnvs3wCqEDeep41k2a:22 X-Proofpoint-ORIG-GUID: atWm1jGC-3lG8IPr6Cy4ZKr1yEWtImxJ X-Proofpoint-GUID: atWm1jGC-3lG8IPr6Cy4ZKr1yEWtImxJ X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1057,Hydra:6.0.680,FMLib:17.12.68.34 definitions=2025-02-19_11,2025-02-19_01,2024-11-22_01 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 impostorscore=0 phishscore=0 adultscore=0 lowpriorityscore=0 malwarescore=0 mlxlogscore=999 suspectscore=0 clxscore=1011 bulkscore=0 spamscore=0 priorityscore=1501 mlxscore=0 classifier=spam authscore=0 authtc=n/a authcc= route=outbound adjust=0 reason=mlx scancount=1 engine=8.21.0-2502100000 definitions=main-2502200017 X-MIME-Autoconverted: from 8bit to quoted-printable by mx0a-0064b401.pphosted.com id 51K1iIca018914 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 20 Feb 2025 02:27:49 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/115527 From: Jinfeng Wang Backport patch [1] to fix memory leak by freeing tclist [1] https://github.com/net-snmp/net-snmp/commit/4bd0d9a8a2860c2c46307aef5ee1ccc69f7e3b62 Signed-off-by: Jinfeng Wang --- ...bs-fix-memory-leak-by-freeing-tclist.patch | 40 +++++++++++++++++++ .../net-snmp/net-snmp_5.9.3.bb | 1 + 2 files changed, 41 insertions(+) create mode 100644 meta-networking/recipes-protocols/net-snmp/net-snmp/0001-unload_all_mibs-fix-memory-leak-by-freeing-tclist.patch diff --git a/meta-networking/recipes-protocols/net-snmp/net-snmp/0001-unload_all_mibs-fix-memory-leak-by-freeing-tclist.patch b/meta-networking/recipes-protocols/net-snmp/net-snmp/0001-unload_all_mibs-fix-memory-leak-by-freeing-tclist.patch new file mode 100644 index 0000000000..3632881501 --- /dev/null +++ b/meta-networking/recipes-protocols/net-snmp/net-snmp/0001-unload_all_mibs-fix-memory-leak-by-freeing-tclist.patch @@ -0,0 +1,40 @@ +From 4bd0d9a8a2860c2c46307aef5ee1ccc69f7e3b62 Mon Sep 17 00:00:00 2001 +From: JanSoundhouse +Date: Mon, 5 Sep 2022 11:25:58 +0200 +Subject: [PATCH] unload_all_mibs: fix memory leak by freeing tclist + +tclist is always allocated in netsnmp_init_mib_internals, when doing multiple init_snmp("")/snmp_shutdown("") this memory is never free'd. + +Upstream-Status: Backport [https://github.com/net-snmp/net-snmp/commit/4bd0d9a8a2860c2c46307aef5ee1ccc69f7e3b62] + +Signed-off-by: Jinfeng Wang +--- + snmplib/parse.c | 5 +++-- + 1 file changed, 3 insertions(+), 2 deletions(-) + +diff --git a/snmplib/parse.c b/snmplib/parse.c +index b3e2f3ae5c..71bdf75ff8 100644 +--- a/snmplib/parse.c ++++ b/snmplib/parse.c +@@ -28,7 +28,7 @@ ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS + SOFTWARE. + ******************************************************************/ + /* +- * Copyright � 2003 Sun Microsystems, Inc. All rights reserved. ++ * Copyright © 2003 Sun Microsystems, Inc. All rights reserved. + * Use is subject to license terms specified in the COPYING file + * distributed with the Net-SNMP package. + */ +@@ -4215,7 +4215,8 @@ unload_all_mibs(void) + if (ptc->description) + free(ptc->description); + } +- memset(tclist, 0, tc_alloc * sizeof(struct tc)); ++ SNMP_FREE(tclist); ++ tc_alloc = 0; + + memset(buckets, 0, sizeof(buckets)); + memset(nbuckets, 0, sizeof(nbuckets)); +-- +2.34.1 + diff --git a/meta-networking/recipes-protocols/net-snmp/net-snmp_5.9.3.bb b/meta-networking/recipes-protocols/net-snmp/net-snmp_5.9.3.bb index eb8e1599fb..88466c94b4 100644 --- a/meta-networking/recipes-protocols/net-snmp/net-snmp_5.9.3.bb +++ b/meta-networking/recipes-protocols/net-snmp/net-snmp_5.9.3.bb @@ -27,6 +27,7 @@ SRC_URI = "${SOURCEFORGE_MIRROR}/net-snmp/net-snmp-${PV}.tar.gz \ file://reproducibility-have-printcap.patch \ file://0001-ac_add_search_path.m4-keep-consistent-between-32bit.patch \ file://CVE-2022-44792-CVE-2022-44793.patch \ + file://0001-unload_all_mibs-fix-memory-leak-by-freeing-tclist.patch \ " SRC_URI[sha256sum] = "2097f29b7e1bf3f1300b4bae52fa2308d0bb8d5d3998dbe02f9462a413a2ef0a"